29 March 2023

Toyota Italy leaked sensitive data for over 1.5 years


Toyota Italy leaked sensitive data for over 1.5 years

Toyota Italy, Toyota Motor's Italian sales and marketing arm, for more than one-and-a-half years exposed secrets for its Salesforce Marketing Cloud and Mapbox APIs, Cybernews research team found.

Cybercriminals could use this data to gain access to Toyota clients’ phone numbers and email addresses and use the this information to launch phishing attacks.

The leak came to light in mid-February 2023, when the researchers discovered an environment file (.env) hosted on the official Toyota Italy website, exposing credentials to the digital marketing platform Salesforce Marketing Cloud.

This could allow malicious actors to gain access to phone numbers and email addresses, customer tracking information, and email, SMS, and push-notification contents and use this data for various purposes like sending bogus SMS messages and emails, or editing marketing campaigns and content tied with the Salesforce Marketing Cloud.

“This leak is significant as it could have been used to launch somewhat sophisticated phishing campaigns, as attackers would have had access and control over Toyota's official communication channels, making it more likely that victims would fall for such an attack, since the sender information would be legitimate,” Cybernews researchers said.

Furthermore, the environment file also exposed Mapbox’s application programming interface (API) tokens, used to query map data.

Cybernews says that the file was first indexed by internet of things (IoT) search engines on May 21, 2021. The leak was addressed only in February 2023 after the researchers informed Toyota about the issue.


Back to the list

Latest Posts

Finland warns of Android malware targeting bank users

Finland warns of Android malware targeting bank users

Once installed, the malware grants cybercriminals unauthorized access to the victim's online banking info.
8 May 2024
LockBit ransomware leader unmasked, charged and sanctioned in the US, UK, and Australia

LockBit ransomware leader unmasked, charged and sanctioned in the US, UK, and Australia

A Russian threat actor behind the alias 'LockBitSupp' has been identified as Dmitry Khoroshev.
7 May 2024
MITRE hackers deployed Rootrot web shell for initial access

MITRE hackers deployed Rootrot web shell for initial access

The China-linked UNC5221 cluster appears to be behind the hack.
7 May 2024